CloudSec Academy

Welcome to CloudSec Academy, your guide to navigating the alphabet soup of cloud security acronyms and industry jargon. Cut through the noise with clear, concise, and expertly crafted content covering fundamentals to best practices.

What is a Reverse Shell Attack?

Wiz Experts Team

A reverse shell attack is a type of cyberattack where a threat actor establishes a connection from a target machine (the victim's) to their machine.

What is an Attack Surface?

Wiz Experts Team

An attack surface is refers to all the potential entry points an attacker could exploit to gain unauthorized access to a system, network, or data.

What is Shadow AI?

Wiz Experts Team

Shadow AI is the unauthorized use or implementation of AI that is not controlled by, or visible to, an organization’s IT department.

Malicious Code Explained

Wiz Experts Team

Malicious code is any software or programming script that exploits software or network vulnerabilities and compromises data integrity.

Shadow Data

Wiz Experts Team

Shadow data is any data that is created, stored, or shared outside of an organization's centralized data management framework and tooling.

Security Misconfigurations

Wiz Experts Team

A security misconfiguration is when incorrect security settings are applied to devices, applications, or data in your infrastructure.

The most common Kubernetes security issues and challenges

Wiz Experts Team

The open-source nature of Kubernetes means that it is continually being updated and improved, which introduces new features and functionalities—as well as new vulnerabilities. Understand the most pressing K8 security challenges.

The top 11 open-source Kubernetes security tools

It’s a good idea to consider a range of Kubernetes security tools. Open source solutions can greatly improve the security of your Kubernetes clusters, so this section explores the top 11 open-source Kubernetes security tools that can help to safeguard your Kubernetes environment.

7 Cloud Security Challenges

Wiz Experts Team

As companies transition to the cloud, they are sure to be confronted with these seven security challenges.

8 All-Too-Common Cloud Vulnerabilities

Wiz Experts Team

We outline the most common cloud vulnerabilities with real-life examples of attacks that exploited these vulnerabilities, and simple steps you can take to mitigate them.

Lateral Movement Explained

Wiz Experts Team

Lateral movement is a cyberattack technique used by threat actors to navigate a network or environment in search of more valuable information after gaining initial access.

Shadow IT Explained

Wiz Experts Team

Shadow IT is an employee’s unauthorized use of IT services, applications, and resources that aren’t controlled by—or visible to—an organization’s IT department.